F5 Networks BIG-IP : GNU C Library vulnerability (SOL15885)

Critical Nessus Plugin ID 79606


The remote device is missing a vendor-supplied security patch.


The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a 'stack extension attack,' a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome. (CVE-2011-1071)


Upgrade to one of the non-vulnerable versions listed in the F5 Solution SOL15885.

See Also


Plugin Details

Severity: Critical

ID: 79606

File Name: f5_bigip_SOL15885.nasl

Version: 1.7

Type: local

Published: 2014/11/28

Updated: 2019/01/04

Dependencies: 76940

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:f5:big-ip_access_policy_manager, cpe:/a:f5:big-ip_application_security_manager, cpe:/a:f5:big-ip_global_traffic_manager, cpe:/a:f5:big-ip_link_controller, cpe:/a:f5:big-ip_local_traffic_manager, cpe:/a:f5:big-ip_wan_optimization_manager, cpe:/a:f5:big-ip_webaccelerator, cpe:/h:f5:big-ip, cpe:/h:f5:big-ip_protocol_security_manager

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/11/27

Reference Information

CVE: CVE-2007-4782, CVE-2010-1917, CVE-2010-2898, CVE-2011-1071

BID: 26403, 41991, 46563

CWE: 94